TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is needed. But there is no assurance for the data stored in the cloud is secure and not changed by the cloud or Third Party Auditor (TPA).Users should be able to assist the TPA to overcome the integrity problems in cloud. In this paper, an enhanced method for securing the TPA by using Keyed Hash Message Authentication Code (HMAC) is proposed.
Authors and Affiliations
Anupriya. A. S , S. Ananthi, , S. Karthik,
FPGA IMPLEMENTATION OF FOUR PHASE CODE DESIGN USING MODIFIED GENETIC ALGORITHM (MGA)
The proposed architecture consists of an efficient VLSI hardware implementation of the Modified Genetic Algorithm for identifying the good pulse compression sequences based on Discrimination Factor. The main advantag...
HIGH SPEED ROUTERS RELY ON WELL DESIGNED PACKET BUFFERS
All packet switches contain packet buffers to hold packets during times of congestion. High-speed routers rely on well-designed packet buffers that support multiple queues, provide large capacity and short response times...
Secure Policy Based Data Sharing for Dynamic Groups in the Cloud
Major problem in public clouds is how to share documents based on fine-grained attribute based access control policies, sharing data in a dynamic groups while preserving data and identity privacy from an un trusted...
Improving the efficiency of Monitoring & detecting Intruders in MANET
Rely on mobile ad hoc networks so many intrusion detection techniques projected based on each node reflexively monitoring the data forwarding by its next hop. This paper projected valued evaluations of false positives an...
BF-PSO optimized PID Controller design using ISE, IAE, IATE and MSE error criteria
A PID controller is designed using ISE, IAE, ITAE and MSE error criteria for stable linear time invariant continuous system. A BF-PSO PID controller is designed for the plant to meet the desired performance specification...